QID 376129
Date Published: 2021-12-07
QID 376129: FortiGate FortiManager and FortiAnalyzer Server-Side Request Forgery (SSRF) Vulnerability (CWE-918)
FortiManager provides centralized policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances, and FortiClient end-point security agents, plus end-to-end network monitoring and device control.
The disclosed vulnerability allows a remote user to perform SSRF attacks.The vulnerability exists due to insufficient validation of user-supplied input in FortiManager and FortiAnalyser GUI. A remote user can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Affected Products:
FortiManager Versions: 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 7.0.0
FortiAnalyzer Versions: 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 7.0.0
QID Detection Logic(Authenticated):
QID will fire the command to get system status and will match the affected version
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
Customers are advised to refer to CVE-2021-32603 for more information.
- CVE-2021-32603 -
www.cybersecurity-help.cz/vdb/SB2021080318 - FG-IR-21-050 -
fortiguard.com/advisory/FG-IR-21-050
CVEs related to QID 376129
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CVE-2021-32603 |
|